Home
last modified time | relevance | path

Searched refs:signer (Results 1 – 21 of 21) sorted by relevance

/openbmc/linux/crypto/asymmetric_keys/
H A Dpkcs7_verify.c177 sinfo->signer = x509; in pkcs7_find_key()
197 struct x509_certificate *x509 = sinfo->signer, *p; in pkcs7_verify_sig_chain()
217 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_verify_sig_chain()
240 x509->signer = x509; in pkcs7_verify_sig_chain()
294 x509->signer = p; in pkcs7_verify_sig_chain()
335 if (!sinfo->signer) in pkcs7_verify_one()
339 sinfo->signer->index, sinfo->index); in pkcs7_verify_one()
346 if (sinfo->signing_time < sinfo->signer->valid_from || in pkcs7_verify_one()
347 sinfo->signing_time > sinfo->signer->valid_to) { in pkcs7_verify_one()
354 ret = public_key_verify_signature(sinfo->signer->pub, sinfo->sig); in pkcs7_verify_one()
H A Dpkcs7_trust.c38 for (x509 = sinfo->signer; x509; x509 = x509->signer) { in pkcs7_validate_trust_one()
68 if (x509->signer == x509) { in pkcs7_validate_trust_one()
127 for (p = sinfo->signer; p != x509; p = p->signer) in pkcs7_validate_trust_one()
H A Dpkcs7_parser.h19 struct x509_certificate *signer; /* Signing certificate (in msg->certs) */ member
H A Dx509_parser.h14 struct x509_certificate *signer; /* Certificate that signed this one */ member
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dsigning-keys.bb28 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
29 signer.export_pubkey(os.path.join(d.expand('${B}'), 'rpm-key'),
34 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
35 signer.export_pubkey(os.path.join(d.expand('${B}'), 'ipk-key'),
40 signer = get_signer(d, d.getVar('PACKAGE_FEED_GPG_BACKEND'))
41 signer.export_pubkey(os.path.join(d.expand('${B}'), 'pf-key'),
/openbmc/qemu/scripts/
H A Dget_maintainer.pl1251 foreach my $signer (@signature_lines) {
1252 $signer = deduplicate_email($signer);
1765 my $signer = $signers[0];
1767 $signer = deduplicate_email($signer);
1770 foreach my $ref(@{$commit_signer_hash{$signer}}) {
1779 push(@{$commit_signer_hash{$signer}},
1842 foreach my $signer (@signers) {
1843 $signer = deduplicate_email($signer);
1949 foreach my $signer (@signers) {
1950 $signer = deduplicate_email($signer);
[all …]
/openbmc/linux/scripts/
H A Dget_maintainer.pl1577 foreach my $signer (@signature_lines) {
1578 $signer = deduplicate_email($signer);
1760 foreach my $signer (@commit_signers) {
1761 $signer = deduplicate_email($signer);
2136 my $signer = $signers[0];
2138 $signer = deduplicate_email($signer);
2141 foreach my $ref(@{$commit_signer_hash{$signer}}) {
2150 push(@{$commit_signer_hash{$signer}},
2225 foreach my $signer (@signers) {
2226 $signer = deduplicate_email($signer);
[all …]
/openbmc/u-boot/doc/uImage.FIT/
H A Dverified-boot.txt25 Images are signed using a private key known only to the signer, but can
46 | signer | * | U-Boot |
62 The public key from the signer allows us to verify and therefore trust
73 The above method works for a signer providing images to a run-time U-Boot.
76 1. Master private key is used by the signer to sign a first-stage image.
H A Dsignature.txt84 allow the signer to operate. These should be added to the .its file.
103 - signer-name: Name of the signer (e.g. "mkimage")
105 - signer-version: Version string of the signer (e.g. "2013.01")
107 - comment: Additional information about the signer or image
119 For config bindings, these properties are added by the signer:
121 - hashed-nodes: A list of nodes which were hashed by the signer. Each is
H A Dbeaglebone_vboot.txt397 signer-version
398 signer-name
/openbmc/u-boot/scripts/
H A Dget_maintainer.pl1538 foreach my $signer (@signature_lines) {
1539 $signer = deduplicate_email($signer);
2071 my $signer = $signers[0];
2073 $signer = deduplicate_email($signer);
2076 foreach my $ref(@{$commit_signer_hash{$signer}}) {
2085 push(@{$commit_signer_hash{$signer}},
2160 foreach my $signer (@signers) {
2161 $signer = deduplicate_email($signer);
2323 foreach my $signer (@signers) {
2324 $signer = deduplicate_email($signer);
[all …]
/openbmc/openbmc/poky/meta/classes/
H A Dsign_ipk.bbclass51 signer = get_signer(d, d.getVar('IPK_GPG_BACKEND'))
55 signer.detach_sign(ipk_to_sign,
H A Dsign_rpm.bbclass62 signer = get_signer(d, d.getVar('RPM_GPG_BACKEND'))
65 signer.sign_rpms(rpms,
/openbmc/openbmc/poky/meta/lib/oe/package_manager/rpm/
H A D__init__.py17 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
19 signer = None
27 if signer:
30 signer.detach_sign(os.path.join(deploy_dir, 'repodata', 'repomd.xml'),
132 signer = get_signer(self.d, self.d.getVar('RPM_GPG_BACKEND'))
134 signer.export_pubkey(pubkey_path, self.d.getVar('RPM_GPG_NAME'))
/openbmc/openbmc-tools/cla-signers/
H A DREADME.md1 # Greppable CLA signer list
/openbmc/openbmc/poky/meta/lib/oe/package_manager/ipk/
H A D__init__.py22 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
24 signer = None
57 if signer:
61 signer.detach_sign(f,
/openbmc/openbmc/poky/meta/lib/oe/package_manager/deb/
H A D__init__.py87 signer = get_signer(self.d, self.d.getVar('PACKAGE_FEED_GPG_BACKEND'))
89 signer = None
90 if signer:
92 signer.detach_sign(f,
/openbmc/openbmc/meta-security/recipes-security/opendnssec/
H A Dopendnssec_2.1.10.bb1 SUMMARY = "OpenDNSSEC is a policy-based zone signer that automates the process of keeping track of …
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch265 + X509 *signer = NULL;
266 + if (OCSP_resp_get0_signer(bs, &signer, NULL) == 1) {
267 + return WvX509(X509_dup(signer));
/openbmc/openbmc/poky/meta/classes-global/
H A Dsstate.bbclass383 signer = get_signer(d, 'local')
384 if not signer.verify(sstatepkg + '.sig', d.getVar("SSTATE_VALID_SIGS")):
850 signer = get_signer(d, 'local')
851 signer.detach_sign(str(tmp_pkg), d.getVar('SSTATE_SIG_KEY'), None,
/openbmc/linux/Documentation/process/
H A Dsubmitting-patches.rst459 The Signed-off-by: tag indicates that the signer was involved in the